international journal of recent technology and …...issn : 2277 - 3878 website: technology and...
TRANSCRIPT
ISSN : 2277 - 3878Website: www.ijrte.org
Technology and EngineeringTechnology and EngineeringInternational Journal of Recent International Journal of Recent
Volume-7 Issue-2, MAY 2018Volume-7 Issue-2, MAY 2018
Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt.
Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt.
n E d a n g i y n g e o e l r o i n n g h c e T t n e c e R I n f t o e l r na n at r i u o o n J l a
IjrteIjrte
Exploring Innovation
www.ijrte.org
EXPLORING INNOVA
TION
Editor-In-Chief Chair Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE
Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal
(M.P.), India
Associated Editor-In-Chief Chair Dr. Dinesh Varshney
Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India
Associated Editor-In-Chief Members Dr. Hai Shanker Hota
Ph.D. (CSE), MCA, MSc (Mathematics)
Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India
Dr. Gamal Abd El-Nasser Ahmed Mohamed Said
Ph.D(CSE), MS(CSE), BSc(EE)
Department of Computer and Information Technology, Port Training Institute, Arab Academy for Science, Technology and Maritime
Transport, Egypt
Dr. Mayank Singh
PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT
Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-
Natal, Durban, South Africa.
Scientific Editors Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran.
Dr. Moinuddin Sarker
Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)
Stamford, USA.
Dr. Shanmugha Priya. Pon
Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East
Africa, Tanzania
Dr. Veronica Mc Gowan
Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,
China.
Dr. Fadiya Samson Oluwaseun
Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern
Cyprus, Turkey.
Dr. Robert Brian Smith
International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia
Dr. Durgesh Mishra
Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India
Executive Editor Chair Dr. Deepak Garg
Professor & Head, Department of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India
Executive Editor Members Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran.
Dr. Saber Mohamed Abd-Allah
Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.
Dr. Xiaoguang Yue
Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.
Dr. Labib Francis Gergis Rofaiel
Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura, Egypt.
Dr. Hugo A.F.A. Santos
ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.
Dr. Sunandan Bhunia
Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia
(Bengal), India.
Dr. Awatif Mohammed Ali Elsiddieg
Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,
Saudi Arabia.
Technical Program Committee Chair Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.
Technical Program Committee Members Dr. Haw Su Cheng
Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.
Dr. Hasan. A. M Al Dabbas
Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.
Dr. Gabil Adilov
Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.
Dr. Ch.V. Raghavendran
Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.
Dr. Thanhtrung Dang
Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,
Hochiminh, Vietnam.
Dr. Wilson Udo Udofia
Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.
Convener Chair Mr. Jitendra Kumar Sen
Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal(M.P.), India
Editorial Chair Dr. Sameh Ghanem Salem Zaghloul
Department of Radar, Military Technical College, Cairo Governorate, Egypt.
Editorial Members Dr. Uma Shanker
Professor, Department of Mathematics, Muzafferpur Institute of Technology, Muzafferpur(Bihar), India
Dr. Rama Shanker
Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea
Dr. Vinita Kumar
Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India
Dr. Brijesh Singh
Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar,
Ahmedabad (Gujarat), India.
Dr. J. Gladson Maria Britto
Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad (Telangana), India.
Dr. Sunil Tekale
Professor, Dean Academics, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad
(Telangana), India.
S.
No
Volume-7 Issue-2, May 2018, ISSN: 2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.
Page
No.
1.
Authors: Vineet Anshuman
Paper Title: Inter-Carrier SDN Orchestration–“The Third-Generation Future Network”
Abstract: There is massive transformation in data communications network which is pushing service providers to re-
think connectivity. With OTT (Over the top players) eating into revenues of the telcos, the telcos are rethinking of a
future network that could deliver self-service, ON demand and seamless cloud connectivity for their customers. The
future network is a network that can deliver Orchestrated network services to enable digital transformation in a
seamless fashion. This will include Network itself being delivered as a service through an automated, orchestrated,
managed software based service orchestrator.
Keywords: The Need for Future Network.
References: Following have been referred for the publication
1. http://www.opennetworking.org
2. www.opendaylight.org
3. http://www.mef.net/ 4. www.linuxfoundation.org
1-3
2.
Authors: Omkar Shivaji Mohite, Aditya Vilas Kumbhar, Mangesh Dhananjay Kulkarni, Ajit Vasant Ghadage,
Kale R.U.
Paper Title: Fault Current Limitation by using Series Transformer
Abstract: This paper related to fault current limitation in radial distribution of network. In order to control fault
current, primary winding of an isolation transformer is connected in series with phase line and secondary winding is
connected to inductive coil (reactor), which is connected in parallel with a bypass switch. This is of parallel insulated
gate bipolar transistor (IGBT). This system can improve the power quality of power system. This system also gives
un- interrupted power supply. The magnitude of the current is reduced due to reactor connected in secondary
winding. Because of simple structure cost is very low. This system is designed for single phase 230 volts, 50Hz ac
supply.
Keywords: Isolation Transformer, Arduino UNO, Reactor, uninterruptable supply.
References: 1. M. T. Hagh and M. Abapour, “DC reactor type transformer inrush current limiter,” IET Elect. Power Appl., vol. 1, no. 5, pp. 808–814, Sep.
2007. 2. IEEE Paper 2015 by Hamid Radmanesh “Series Transformer-Based Solid State Fault Current Limiter”
3. www.Electronics foryou.com.
4. “Power System & its faults” book by J.B. Gupta
4-6
3.
Authors: Carmen Georgeta Dumitrache
Paper Title: Topography and Cadastral Applications
Abstract: Surveying or land surveying is the technique, profession and science to determine the exact position of
terrestrial or three-dimensional points and distances and angles between them. These points are usually on the Earth's
surface, and are often used to establish land maps and boundaries ownership or governmental purposes. In this paper
I will make some analyze about topography and cadastral applications.
Keywords: Land, Cadaster, Topography, Surface Area.
References: 1. Johnson, Anthony, Solving Stonehenge: New Key to an Ancient Enigma. (Thames & Hudson, 2008) ISBN 978-0-500-05155-9
2. National Cooperative Highway Research Program: collection, processing and integration of GPS data in GIS, p. 40. Published by Transport
Research Board, 2002 ISBN 0309069165, 9780309069168 3. Toni Schenk1, Suyoung Seo, Beata Csatho Study Precision Airborne Laser Scanning Data with Photogrammetry, p. 118
4. Thomas Kibblewhilte şi Sara J Wilkinson, Measurement units: a phenomenon in the UK or profession with genuine global appeal?
International Federation of Surveyors, 2004. Retrieved December 13, 2011. 5. http://www.surveyorsinfrance.com
6. A system test history Rectangular Albert C. White, 1983 Pub: Washington, DC: US Department of Interior, Bureau of Land Management:
For sale by the Supt. de Docs, USGPO.
7-10
4.
Authors: Eesha Mishra, Archita Bhatnagar
Paper Title: Wanna Cry Ransom Ware: Evaluating Risk & Implementing Security Measures
Abstract: Incidents of wannacry has been escalated over 150 countries, including the United States, United
Kingdom, Spain, Russia, Taiwan, France, and Japan. The software can run in as many as 27 different languages, it is
important to understand to what extent cyber attacks can be predicted . There are many related and ongoing research
available on cyber security threat, but wannacry ransomware attack has become one of the main security concern
now a days. This paper shall evaluate the securitymeasures to secure victim's pc from wannacry ransomware attack
and analyze the risk from this threat.
11-12
Keywords: Ransom Ware, Wannacry.
References: 1. http://www.cyberswachhtakendra.gov.in/alerts/wannacry_ransomware.html
2. https://www.avast.com/faq.php?article=AVKB50
3. https://dl.acm.org/citation.cfm?id=3053035
5.
Authors: Namit Mohale, Sourabh Gupta, Shubham Goyal, Ruchi Goel
Paper Title: iG Protection (Data Encryption using Gestures)
Abstract: In today’s world, unimaginable bytes of data is being generated every second around the globe. A lot of
this data is private and confidential to individuals or organizations, and they do not wish for others to access this data.
They might keep the data safe in portable drives, but as soon as the data gets connected to a network or is being
transferred through a network, it becomes highly vulnerable to threats of it being stolen by hackers, as network has
the biggest loopholes as compared to rest when it comes to security. The data is also vulnerable to being physically
stolen. Depending on the delicacy of data, it could be highly misused for all you know it could be the nuclear launch
codes. Here we propose a method to not only encrypt the data for protection, but to take it to a different level. Whilst
data encryption algorithms auto-generate secret keys that are used to encrypt the data, we propose in our method to
use hand gestures to generate to generate the key, each key being unique to a certain set and sequence of hand
gestures, to be used as encryption key in encryption algorithm. Hence we are using Blowfish algorithm for data
encryption and Open CV for gesture recognition. Blowfish being a symmetric key algorithm, the same set of gestures
that were used to encrypt the data would be used to decrypt it.
Keywords: Data Encryption, Blowfish Algorithm, Gesture Recognition, Open CV, Artificial, Intelligence,
Symmetric Key Encryption, Decryption.
References: 1. Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov, “Realtime Computer Vision with OpenCV”, ACM New York, 2012
2. Gary Bradski, Adrian Kaehler, “Learning OpenCV”, Willow Garage, ICRA 2010 ROS Tutorial
3. Tanjyot Aurora, Parul Arora, “Blowfish Algorithm”, IJCSCE, 2013 4. Bill Gatliff, “Encrypting data with Blowfish Algorithm”, 2003
5. Schneier, Bruce, “Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition”, New York, NY: John Wiley & Sons,
1995
13-16